Amazon’s logic is you paid a subsidized/cheaper price that is offset by included ads. You can buy it without ads (more expensive, obviously) from the start.
Blocking older known malware still blocks them, so that’s good (and saves bandwidth because the connection never happens, so this is really good).
If the site is hijacked, it needs blocked till it’s unhijacked. So this is good as well.
This is not really a point?
Number one above, stopping the connection before it happens, is really the best benefit, in my opinion. And if they boast a high false positive, you need better lists. You keep saying “they don’t block this or block that.” They are (nothing is) a one stop shop. Simply because they don’t block what you’re cherry picking does not make them bad. Use multiple layers. You say “don’t use a blocklist, use MS Defender instead.” Why not use both the blocklist, MS Defender, and even more stuff? Multiple layers. Defense in depth.
I use ProtonVPN’s Secure Core. Their entry nodes are in privacy-friendly countries — Switzerland, Iceland, or Sweden — and exit nodes can be to any of their VPN servers in dozens of countries around the world. It’s a double hop which increases latency slightly, but I don’t real-time game on this configuration.
it won’t take long for someone to build a Wamazon Linux distro with all the features and none of the crap.
I don’t know what “features” Amazon would include that aren’t somehow directly tied into their store and ease of shopping…aka “crap.” It’s not like they would build a better video/audio driver or something. It would all just be more…advertising and analytics, probably on a cheap platform as hardware has never been their largest source of income, to include Kindles (AWS is, last I checked). Strip those two out of their build and we have essentially an untouched kernel lol, at least that’s how I see it happening.
No one offered to? Not even the business who runs the site nor the departments within said business who do the testing? From the link:
What we test - Canonical’s QA team performs an extensive set of over 500 OS compatibility focused hardware tests to ensure the best Ubuntu experience. Every aspect of the system is checked and verified.
Regular testing for up to 10 years - Roughly every 3 weeks, Ubuntu releases Stable Release Updates, ensuring a secure and reliable experience. These updates are carefully tested by the Hardware Certification team to make sure that systems work well with Ubuntu.
Our laboratories - Canonical conducts tests in dedicated laboratories, located around the world. The “Ubuntu Certified” label is applied to systems that have been verified and are continuously tested by Canonical throughout the Ubuntu release life cycle.
Sounds like it should be someone’s job at Canonical to update the list/site.
Being able to command a device to send you info or perform tasks is different than the device sending info of its own accord.
In this context, where it’s implied to send without the owner’s knowledge (ignoring the fact it’s documented), not really. The article screams “gotcha!” when in reality it didn’t, so they’re trying to backtrack and downplay their initial response. But I do appreciate their update, it’s just got a PR spin to it.
Edit: if the article was initially written as more of a “did you know” and/or expanding on existing documentation, wouldn’t be an issue. It’s the “it’s secretly stealing” that implies malice which is part of the definition of malware… that’shares a category with backdoor. So splitting hairs in the name of PR.